CVE-2023-6683

Source
https://cve.org/CVERecord?id=CVE-2023-6683
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6683.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-6683
Downstream
Related
Published
2024-01-12T19:01:25.542Z
Modified
2026-05-15T12:05:01.491274624Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Qemu: vnc: null pointer dereference in qemu_clipboard_request()
Details

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemuclipboardrequest() function can be reached before vncservercuttextcaps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.

Database specific
{
    "cwe_ids": [
        "CWE-476"
    ],
    "cna_assigner": "redhat",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6683.json"
}
References

Affected packages